This paper introduces a quantum-inspired ultra-lightweight encryption algorithm tailored for Internet of things devices with limited resources. The proposed algorithm excels in processing speed, memory usage, and energy efficiency, significantly outperforming existing lightweight cryptographic algorithms. With a processing speed of 12.4 ms, memory usage of 3.2 kilobytes, and energy consumption of 0.7 milli-Joules per kilobyte, the proposed algorithm stands out for its robust security and potential to enhance the security of Internet of things devices across various applications. This paper explores the methodology behind the proposed algorithm, comparing its performance metrics with conventional S-box generation approaches, and demonstrates its superiority in both theoretical and practical aspects.
M. A. B. Farah, A. Farah, and T. Farah, “An image encryption scheme based on a new hybrid chaotic map and optimized substitution box,” Nonlinear Dyn., vol. 99, pp. 3041–3064, 2019.
M. Aslam, S. Beg, A. Anjum, Z. Qadir, S. Khan, S. U. R. Maliket, and M. A. P. Mahmud, “A strong construction of s-box using mandelbrot set an image encryption scheme,” Peerj Comput. Sci., vol. 8, 2022, Art no. e892.
A. Lawah, A. Ibrahim, S. Salih, H. Alhadawi, and P. JosephNg, “Grey wolf optimizer and discrete chaotic map for substitution boxes design and optimization,” IEEE Access, vol. 11, pp. 42416–42430, 2023.
G. Murtaza, N. Azam, and U. Hayat, “Designing an efficient and highly dynamic substitution-box generator for block ciphers based on finite elliptic curves,” Security Commun. Networks, vol. 2021, 2021, Art no. 3367521.
D. Zhu, X. Tong, M. Zhang, and Z. Wang, “A new S-Box generation method and advanced design based on combined chaotic system,” Symmetry, vol. 12, no. 12, 2020, Art no. 2087.
X. Wang, Ü. Çavuşoğlu, S. Kaçar, A. Akgul, V. T. Pham, S. Jafari, F. E. Alsaadiet, and X. Q. Nguyen, “S-Box based image encryption application using a chaotic system without equilibrium,” Appl. Sci., vol. 9, no. 4, 2019, Art no. 781.
Y. Q. Zhang, J. L. Hao, and X. Y. Wang, “An efficient image encryption scheme based on s-boxes and fractional-order differential logistic map,” IEEE Access, vol. 8, pp. 54175–54188, 2020.
A. Indumathi and G. Sumathi, “Construction of key-dependent s-box for secure cloud storage,” Intell. Automation Soft Comput., vol. 32, no. 3, pp. 1509–1524, 2022.
B. Abd-El-Atty, “Efficient S-Box construction based on quantum-inspired quantum walks with PSO algorithm and its application to image cryptosystem,” Complex Intell. Syst., vol. 9, pp. 4817–4835, 2023.
A. A. A. El-Latif, B. Abd-El-Atty, M. Amin, and A. M. Iliyasu, “Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications,” Scientific Rep., vol. 10, 2020, Art no. 1930.
A. H. Zahid, M. Ahmad, A. Alkhayyat, M. J. Arshad, M. M. U. Shaban, N. F. Solimanet, and A. D. Algami, “Construction of optimized dynamic s-boxes based on a cubic modular transform and the sine function,” IEEE Access, vol. 9, pp. 131273–131285, 2021.
A. H. Zahid, H. Rashid, M. M. U. Shaban, S. Ahmad, E. Ahmed, M. T. Amjadet, M. A. T. Baig, M. J. Arshad, M. N. Tariq, M. W. Tariq, M. A. Zafar, and A. Basit, “Dynamic S-Box design using a novel square polynomial transformation and permutation,” IEEE Access, vol. 9, pp. 82390–82401, 2021.
Ö. Şengel, M. A. Aydin, and A. Sertbas, “An efficient generation and security analysis of substitution box using fingerprint patterns,” IEEE Access, vol. 8, pp. 160158–160176, 2020.
Y. Jeon, S. Baek, and J. Kim, “A novel framework to construct quantum circuits of S-Boxes: applications to 4-bit S-Boxes,” in 7th International Conference on Mobile Internet Security, Okinawa, Japan, Dec. 19–21, 2023, Article no. 12.
D. Konar, S. Bhattacharyya, B. K. Panigrahi, and E. C. Behrman, “Qutrit-inspired fully self-supervised shallow quantum learning network for brain tumor segmentation,” IEEE Trans. Neural Networks Learn. Syst., vol. 33, no. 11, pp. 6331–6345, 2022.
V. Nandan and R. G. S. Rao, “Low-power AES S-Box design using dual-basis tower field extension method for cyber security applications,” Complex Intell. Syst., vol. 9, pp. 2959–2967, 2023.
Z. Liang and Y. Huang, “Survey on deep-learning-based 3D object detection in autonomous driving,” Trans. Inst. Meas. Control, vol. 45, no. 4, pp. 761–776, 2022.
J. Zhang, Z. Yan, S. Fei, M. Wang, T. Li, and H. Wang, “Is today's end-to-end communication security enough for 5g and its beyond?,” IEEE Netw., vol. 36, no. 1, pp. 105–112, 2022.
D. Konar, S. Bhattacharyya, B. K. Panigrahi, and E. C. Behrman, “Qutrit-inspired fully self-supervised shallow quantum learning network for brain tumour segmentation,” IEEE Trans. Neural Networks Learn. Syst., vol. 33, no. 11, pp. 6331–6345, 2022.
X. Ji, B. Wang, F. Hu, C. Wang, and H. Zhang, “New advanced computing architecture for cryptography design and analysis by d-wave quantum annealer,” Tsinghua Sci. Technol., vol. 27, no. 4, pp. 751–759, 2022.
T. M. Fernández-Caramés and P. Fraga-Lamas, “Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks,” IEEE Access, vol. 8, pp. 21091–21116, 2020.
R. U. Rasool, H. F. Ahmad, W. Rafique, A. Qayyum, J. Qadir, and Z. Anwar, “Quantum computing for healthcare: A review,” Future Internet, vol. 15, no. 3, 2023, Art no. 94.
K. Kasliwal, J. P. N. A. Jain, and R. K. Bahl, “Enhancing satellite‐to‐ground communication using quantum key distribution,” IET Quan. Commun., vol. 4, no. 2, pp. 57–69, 2023.
Y. Li, P. Zhang, and R. Huang, “Lightweight quantum encryption for secure transmission of power data in smart grid,” IEEE Access, vol. 7, pp. 36285–36293, 2019.
Z. Hua, J. Li, Y. Chen, and S. Yi, “Design and application of an S-Box using complete Latin square,” Nonlinear Dyn., vol. 104, pp. 807–825, 2021.
Q. B. Luo, G. W. Yang, X. Y. Li, and Q. Li, “Quantum reversible circuits for GF (28) multiplicative inverse,” EPJ Quan. Technol., vol. 9, 2022, Art no. 24.
J. Zheng and T. Bao, “An image encryption algorithm using cascade chaotic map and S-Box,” Entropy, vol. 24, no. 12, 2022, Art no. 1827.
A. H. Zahid, L. Tawalbeh, M. Ahmad, A. Alkhayyat, M. T. Hassan, A. Manzoor, and A. K. Farhan, “Efficient dynamic S-Box generation using linear trigonometric transformation for security applications,” IEEE Access, vol. 9, pp. 98460–98475, 2021.
M. Ahmad, I. A. Khaja, A. Baz, H. Alhakami, and W. Alhakami, “Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications,” IEEE Access, vol. 8, pp. 116132–116147, 2020.
E. Spaho and K. Dhoska, “Proposal of a LoRaWAN-based IoT system for food waste management,” Int. J. Innovative Technol. Interdiscip. Sci., vol. 3, no. 3, pp. 474–479, 2020.
E. Bebi, A. Stermasi, M. Alcani, and M. Cenameri, “Assessment of wind potential: The case of Puka Region in Albania,” Int. J. Innovative Technol. Interdiscip. Sci., vol. 6, no. 1, pp. 1112–1120, 2023.
M. Baballëku, A. Verzivolli, R. Luka, and R. Zgjanolli, “Fundamental basic wind speed in Albania: An adoption in accordance with Eurocodes,” J. Trans. Syst. Eng., vol. 1, no. 2, pp. 56–72, 2023.
S. Qosja, R. Rolle, and A. Gebremedhin, “Solving the Bottleneck issue of energy supply, Case study of a wind power plant,” Int. J. Innovative Technol. Interdiscip. Sci., vol. 5, no. 2, pp. 874–891, 2022.
K. Dhoska, E. Bebi, I. Markja, P. Milo, E. Sita, and S. Qosja, “Modeling the wind potential energy for metallurgical sector in Albania,” Scientific Rep., vol. 14, 2024, Art no. 1302.
A. El-Bakari, A. Khamlichi, and E. Jacquelin, “Improving structural health monitoring with impact zone localization using heuristic algorithms,” Pollack Period., vol. 18, no. 3, pp. 26–32, 2023.
S. Luo, N. Li, and X. Cao, “Relative entropy between quantum ensembles,” Period. Mathematica Hungarica, vol. 59, no. 2, pp. 223–237, 2009.
P. Sobkowicz, “Simulations of opinion changes in scientific communities,” Scientometrics, vol. 87, no. 2, pp. 233–250, 2011.
A. Apparao and G. C. Sekhar, “Hybrid MDA-ANFIS approach based control of grid connected solar system with nine level inverter wind energy conversion,” Int. Rev. Appl. Sci. Eng., vol. 14, no. 2, pp. 183–200, 2023.
Z. A. Hasan, S. M. Hadi, and W. A. Mahmoud, “Speech scrambler with multi-wavelet, Arnold Transform and particle swarm optimization,” Pollack Period., vol. 18, no. 3, pp. 125–131, 2023.
Z. A. Hasan, S. M. Hadi, and W. A. Mahmoud, “Time domain speech scrambler based on particle swarm optimization,” Pollack Period., vol. 18, no. 1, pp. 161–166, 2023.